Analysis
-
max time kernel
146s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02-06-2024 23:54
Static task
static1
Behavioral task
behavioral1
Sample
8fdf2fa125c2b13949ff8bed8023d7f1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8fdf2fa125c2b13949ff8bed8023d7f1_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8fdf2fa125c2b13949ff8bed8023d7f1_JaffaCakes118.html
-
Size
25KB
-
MD5
8fdf2fa125c2b13949ff8bed8023d7f1
-
SHA1
db6cad2da9ddf9b0d4ec3ce1d71f9a26f48e6c54
-
SHA256
e21983a392ded034f5578a3bbe0a7a301be93b30520e6c7c09a6547bff5de9a6
-
SHA512
1ba0bb99603ab1a7904f5fc499625606a7238df582f5592fa84074f72bd55d20ae47e791dc04e25e7d2807618df4a3b5a7375caf7d998341ab0629897c4b659b
-
SSDEEP
768:SRdTOV6JsqTupwmuFM+SJa6phfupy92YvXmaZZVZeHmE:SRVOVFqTj6pop3YvXmaXVoHmE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4364 msedge.exe 4364 msedge.exe 3580 msedge.exe 3580 msedge.exe 4184 identity_helper.exe 4184 identity_helper.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3580 wrote to memory of 564 3580 msedge.exe 82 PID 3580 wrote to memory of 564 3580 msedge.exe 82 PID 3580 wrote to memory of 3760 3580 msedge.exe 85 PID 3580 wrote to memory of 3760 3580 msedge.exe 85 PID 3580 wrote to memory of 3760 3580 msedge.exe 85 PID 3580 wrote to memory of 3760 3580 msedge.exe 85 PID 3580 wrote to memory of 3760 3580 msedge.exe 85 PID 3580 wrote to memory of 3760 3580 msedge.exe 85 PID 3580 wrote to memory of 3760 3580 msedge.exe 85 PID 3580 wrote to memory of 3760 3580 msedge.exe 85 PID 3580 wrote to memory of 3760 3580 msedge.exe 85 PID 3580 wrote to memory of 3760 3580 msedge.exe 85 PID 3580 wrote to memory of 3760 3580 msedge.exe 85 PID 3580 wrote to memory of 3760 3580 msedge.exe 85 PID 3580 wrote to memory of 3760 3580 msedge.exe 85 PID 3580 wrote to memory of 3760 3580 msedge.exe 85 PID 3580 wrote to memory of 3760 3580 msedge.exe 85 PID 3580 wrote to memory of 3760 3580 msedge.exe 85 PID 3580 wrote to memory of 3760 3580 msedge.exe 85 PID 3580 wrote to memory of 3760 3580 msedge.exe 85 PID 3580 wrote to memory of 3760 3580 msedge.exe 85 PID 3580 wrote to memory of 3760 3580 msedge.exe 85 PID 3580 wrote to memory of 3760 3580 msedge.exe 85 PID 3580 wrote to memory of 3760 3580 msedge.exe 85 PID 3580 wrote to memory of 3760 3580 msedge.exe 85 PID 3580 wrote to memory of 3760 3580 msedge.exe 85 PID 3580 wrote to memory of 3760 3580 msedge.exe 85 PID 3580 wrote to memory of 3760 3580 msedge.exe 85 PID 3580 wrote to memory of 3760 3580 msedge.exe 85 PID 3580 wrote to memory of 3760 3580 msedge.exe 85 PID 3580 wrote to memory of 3760 3580 msedge.exe 85 PID 3580 wrote to memory of 3760 3580 msedge.exe 85 PID 3580 wrote to memory of 3760 3580 msedge.exe 85 PID 3580 wrote to memory of 3760 3580 msedge.exe 85 PID 3580 wrote to memory of 3760 3580 msedge.exe 85 PID 3580 wrote to memory of 3760 3580 msedge.exe 85 PID 3580 wrote to memory of 3760 3580 msedge.exe 85 PID 3580 wrote to memory of 3760 3580 msedge.exe 85 PID 3580 wrote to memory of 3760 3580 msedge.exe 85 PID 3580 wrote to memory of 3760 3580 msedge.exe 85 PID 3580 wrote to memory of 3760 3580 msedge.exe 85 PID 3580 wrote to memory of 3760 3580 msedge.exe 85 PID 3580 wrote to memory of 4364 3580 msedge.exe 86 PID 3580 wrote to memory of 4364 3580 msedge.exe 86 PID 3580 wrote to memory of 4240 3580 msedge.exe 87 PID 3580 wrote to memory of 4240 3580 msedge.exe 87 PID 3580 wrote to memory of 4240 3580 msedge.exe 87 PID 3580 wrote to memory of 4240 3580 msedge.exe 87 PID 3580 wrote to memory of 4240 3580 msedge.exe 87 PID 3580 wrote to memory of 4240 3580 msedge.exe 87 PID 3580 wrote to memory of 4240 3580 msedge.exe 87 PID 3580 wrote to memory of 4240 3580 msedge.exe 87 PID 3580 wrote to memory of 4240 3580 msedge.exe 87 PID 3580 wrote to memory of 4240 3580 msedge.exe 87 PID 3580 wrote to memory of 4240 3580 msedge.exe 87 PID 3580 wrote to memory of 4240 3580 msedge.exe 87 PID 3580 wrote to memory of 4240 3580 msedge.exe 87 PID 3580 wrote to memory of 4240 3580 msedge.exe 87 PID 3580 wrote to memory of 4240 3580 msedge.exe 87 PID 3580 wrote to memory of 4240 3580 msedge.exe 87 PID 3580 wrote to memory of 4240 3580 msedge.exe 87 PID 3580 wrote to memory of 4240 3580 msedge.exe 87 PID 3580 wrote to memory of 4240 3580 msedge.exe 87 PID 3580 wrote to memory of 4240 3580 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8fdf2fa125c2b13949ff8bed8023d7f1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xe0,0x108,0x7ffc63f746f8,0x7ffc63f74708,0x7ffc63f747182⤵PID:564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1840,1678914372491317052,3534654104263422194,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1956 /prefetch:22⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1840,1678914372491317052,3534654104263422194,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1956 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1840,1678914372491317052,3534654104263422194,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,1678914372491317052,3534654104263422194,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,1678914372491317052,3534654104263422194,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,1678914372491317052,3534654104263422194,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,1678914372491317052,3534654104263422194,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:12⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,1678914372491317052,3534654104263422194,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1364 /prefetch:12⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,1678914372491317052,3534654104263422194,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,1678914372491317052,3534654104263422194,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6164 /prefetch:12⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,1678914372491317052,3534654104263422194,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6344 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1840,1678914372491317052,3534654104263422194,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6856 /prefetch:82⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1840,1678914372491317052,3534654104263422194,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6856 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,1678914372491317052,3534654104263422194,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6456 /prefetch:12⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,1678914372491317052,3534654104263422194,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,1678914372491317052,3534654104263422194,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6312 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,1678914372491317052,3534654104263422194,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6324 /prefetch:12⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1840,1678914372491317052,3534654104263422194,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4812 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5052
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3032
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD51db791a1f69a02ea8c5f277289d89ce6
SHA11a5f46cd196190090f770c95c0ffd990b8e79980
SHA256edc530f8cfeada4dcebaa12e8fa29fec043ab9d0eb4157167adc46f77776cf71
SHA512e54167bd428854429cf5293f4b927d4e86ef37baac20eb5428c06d9b8b6af3aba8319f90b286938aeefa4117fb3957abfcbdf80cc016fec179851e1a2bd2bc5e
-
Filesize
1KB
MD55d1ee85fa7d07932c2f4b207261b620b
SHA1437a2fb5a8aefecfa7f51ebd254d7f345af259f2
SHA256f243e7c6007310f2199aa8a9bcc77e81be2005e265c005d690c7abe3a3a1acf8
SHA512df9d3bde6e33988fa4021c5212426cc880032982ceacd5ff686d70eaeb0474282617fb022f2d1cb967f997f0879201cbedf7d68a0b4a167e945e8408702b646a
-
Filesize
1KB
MD537bbcdfc5aad58e7490b29ce0dce63d8
SHA110d6f9378661ce19b6e75c9741ade942e6d9abf6
SHA25616d8b7eb8c0b3d482b08f0f251193a393b862660eb01368f4419ee2ce65a8044
SHA512b3c917325b25b5371b4475b4cd911b966c382a5232841f78eeca7890e912bffe80848925a12ee0cb243af19a98c2f61b654049a1fe032e72cc162da857fd846d
-
Filesize
5KB
MD511f6302db59d5e63413e35d37c822f6c
SHA1c53b20bfce7ce9a6dd52caa1eef0bc863f94ebe8
SHA2566f7b97747aa606142e59386cf6b81be8c70c3691e86c314411356c6a9c8d3ee3
SHA512a57e843abc0bcf9e8fa2a0a061229c867ea99c5d07ffdd9a13775f6ab9c3aaab35fa6388956c731e5cfb17317e72f4e638473a040800e9df3879ed06885e2dc6
-
Filesize
6KB
MD5a700fe5df28baa01e1dafc403357e8e2
SHA12a54c14a4631b52631f8f2f8836be4ac01441e4d
SHA2561624c292af696677992c9756e113aa5be4af593992157738dcea5dd1abba3be3
SHA512f0bd9a40ec74bf799a8f0d6a73cae89d275a0f1c745db57eb1f0af5d40ffd75450eb44f4d96cac42ad2754921a60a06915a347db97a6d31192290e690b1301e4
-
Filesize
7KB
MD58376b4a2795e316e16c8b8f02465db27
SHA1c343c498a7702bb4cb7212c26e2f79fae8b4be94
SHA256ae0c39ca951c3e2e5f0552e01a0f4d57882dd305a0866ebb0c9783a37f538ea0
SHA51250c810231a9a35a0f59fa734f3ff3a8fe13d0327dd4f00e4ae7be1880890637f3615500ee7dca0c185581e0c75a20f522a7d582a441e30c9f175c2dd053f8f10
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58179d1bc05b38beb9b57f289b7e4a1aa
SHA16b84abe9f94081597b0a562c019484dae4b32676
SHA256dd105d5cc3953e8d84ab1958b2fcb02f8c78afd751e3c5120d34e21992515a0a
SHA512c0156d3c71e0cc2b3f4c4d43834e49ef95f57830e36afc96027494f89a72bd5297781fdce70272aa6d942e5ce0b0500e83fb9beee2ddc3fe9778040b9c7a8dea